BazarBackdoor

Description

(BleepingComputer) After a victim launches the downloaded file, the loader will sleep for a short period of time and then connect to command and control servers to check-in and download the backdoor payload. To get the address of the command and control servers, BazarLoader will use the Emercoin decentralized DNS resolution service to resolve various hostnames that use the ‘bazar’ domain. The ‘bazar’ domain can only be utilized on Emercoin’s DNS servers, and as it is decentralized, it makes it difficult, if not impossible, for law enforcement to seize the hostname.

After the payload is downloaded, it will be filelessly injected into the C:\Windows\system32\svchost.exe process. Security researcher Vitali Kremez told BleepingComputer that this is done using the Process Hollowing and Process Doppelgänging techniques.

After a period of time, both Kremez and James have told BleepingComputer that the backdoor will download and execute the Cobalt Strike penetration testing and post-exploitation toolkit on the victim’s machine.

Names

Name
BazarBackdoor
BazarLoader
BEERBOT
BazarCall
KEGTAP
Team9Backdoor
bazaloader

Category

Malware

Type

  • Backdoor
  • Downloader

Information

Malpedia

Other Information

Uuid

45260893-fa7b-4738-aecd-7d6ad6cc1577

Last Card Change

2022-11-18